Collins Aerospace Systems (CAS)
Under October 2018 UTC's acquisition, Rockwell Collins will become a combined business unit with UTC Aerospace Systems (UTAS) called “Collins Aerospace Systems.” Rockwell Collins CEO Kelly Ortberg will lead the combined Collins Aerospace business and UTAS President Dave Gitlin will become its COO. The company designs, produces and supports communications and...

“In 2018, the dynamic nature of cyberspace is a result of rapid advancements in computer and communication technologies as well as the tight coupling of the cyber domain with physical operations. Military organizations have embedded cyberspace assets—their information technology—into mission processes to increase ...

Office of the Attorney General, Washington, D. C. 2053
Jefferson B. Sessions III -He was named Jefferson after his father, grandfather and great grandfather who was named after Jefferson Davis the President of the Confederacy. Merited a place in TIME magazine's ''The 100 Most Influential People'' (leaders) with an homage penned by Senator from Kentucky Mitch McConnell [April 2018]. ...

The Mission
The US Army Mission is to deploy, fight, and win USA’s wars by providing ready, prompt, and sustained land dominance by US Army forces across the full spectrum of conflict as part of the Joint Force. The mission is vital to the USA because US Army is a service capable of defeating enemy ground forces and indefinitely seizing and controlling the enemies land, re...

The Reality-"A date which will live in infamy"
On the early morning of Sunday, December 7, 1941, the sneak attack of Pearl Harbor was intended as a preventive action in order to keep the U.S. Pacific Fleet from interfering with military actions the Empire of Japan was planning in Southeast Asia against overseas territories of the United Kingdom, the Netherlands, and the United States. The...

Four-star General Paul Nakasone assumed his dual position as the NSA director and the US cyber commander in May 2018. The same month the US Cyber Command, originally created within the NSA in May 2009, was elevated to the status of an independent unified command....

On June 29, 2017 President Trump said, “We’re here today to usher in a new American energy policy — one that unlocks million and millions of jobs and trillions of dollars in wealth. For over 40 years, America was vulnerable to foreign regimes that used energy as an economic weapon....

Google - a Silicon Valley Beacon of Political Correctness-Project Maven –It was officially launched last year by the US Department of Defense Algorithmic Warfare Cross-Functional Team. The project’s goal is to create an AI program that will improve the targeting of drone strikes....

“Mr. President, in signing this space policy directive, you are ensuring that America will lead in space once again. To guide this new era of American space leadership, President Trump has relaunched the National Space Council. And at the Council’s inaugural meeting in October, we unanimously approved a ...

“In 2018, the dynamic nature of cyberspace is a result of rapid advancements in computer and communication technologies as well as the tight coupling of the cyber domain with physical operations. Military organizations have embedded cyberspace assets—their information technology—into mission processes to increase operational efficiency, improve decision-making quality and shorten the sensor-to-shooter cycle. But this cyberspace asset-to-mission dependency can put a mission at risk when a cyber incident occurs, such as the loss or manipulation of a critical information resource. The Y2K event went out with a whimper and not a bang, but not because the issue wasn’t serious. The potential for massive data disruption was there, but government and industry rallied to address it before the January 1, 2000, deadline. The millennium bug was squashed because stakeholders with a lot to lose attacked it in a coordinated effort. That approach can serve as both a lesson and a model for the latest security challenge: the cyber bug ”

Nonmilitary organizations typically address this type of cybersecurity risk through an introspective, enterprise wide program that continuously identifies, prioritizes and documents risks. This allows for selection of an economical set of control measures—people, processes and technology—to mitigate risks to an acceptable level. The explicit valuation of information and cyber resources, in terms of their ability to support the organizational mission, enables the creation of a continuity of operations plan and an incident recovery plan. But above all, cyber response demands the same sense of urgency as Y2K. In addition, information technology/operational technology (IT/OT) risk must be aligned with real-world risk. I have not seen the same rigor about IT/OT risk since Y2K. Unfortunately, what followed Y2K was a huge decline in information technology spending and a reversal to less governance of IT/OT portfolios. This led to more risk by allowing technology to lapse naturally after a big investment, along with the regrowth of shadow information technology. According to a Market to Market report, global spending on cybersecurity will be nearly $170 billion by 2020, and that figure does not include all the other information technology spending, which is approaching $4 trillion, analysts estimate. The money is there, but why not spend it through a structured framework to address the cyber bug today?

The millennium bug was considered a once-in-a-lifetime opportunity to clean up and standardize information technology. Now we need to do it again. We did not learn our lesson after the turn of the century as we relegated information technology back to a supporting role. Operational technology continues in its own lane instead of being incorporated into the overall business and mission risk equation. But for business, government and nearly every person, technology is part of the fabric of everyday life. The Internet of Things (IoT) promises to advance that principle even further. The approach for solving the millennium bug challenge should serve as a framework for stopping the cyber bug. The need for a solution is becoming even more urgent with the explosion of IoT devices. We have succeeded with this approach before, and we can do so again. But this time, we must be sure to learn our lesson.”

Maj. Gen. Earl D. Matthews, USAF (Ret.), the former director of cyberspace operations in the Air Force’s Office of Information Dominance and Chief Information Officer, is vice president of the Enterprise Security Solutions Group for DXC Technology (formerly known as Hewlett Packard Enterprise Services), U.S. Public Sector. The views expressed here are his own. (source:Signal Magazine By Maj. Gen. Earl D. Matthews, USAF (Ret.) June 1, 2017)

GMCstream Author

Publications

Articles

Books

AEROSPACE LOGISTICS & SUPPLY CHAIN MANAGEMENT -

"AEROSPACE LOGISTICS AND SUPPLY CHAIN MANAGEMENT"- GMCStream Inc. contributor - Bruce L. Brager
“I don’t know what the hell this ‘logistics’ is that Marshall is always talking about, but I want some of it.”
These are the ...

GMCStream Global MiLCOMM Special Technology Product of the Month
Lockheed Martin’s INFIRNO™ is a high performance targeting system that enables users to deploy precision guided munitions at maximum range. Its modular, reconfigurable tur...

Mobility Cybersecurity in a Global World of Security Breaches
In this article, the author explores new domains of global mobility or new insights gained from re-examining establish cybersecurity topics. Further, the article demonstrates a focus on compre...

U.S. National Security NSS

Russia Military Power Report

Air Superiority 2030 Flight Plan

Information Assurance Through Defense in Depth

released 2-2000

Report on the MH17

released 10-2015by the Dutch Safety Board

2016 Cyberthreat Defense Report

The DoD Cyber Strategy

Global Nuclear Landscape 2018

Newsletters

About GMCstream

GMCStream is an American Internet media company based in Mountain View, California. The company is a social media news and information company with a directed focus on digital broadband media. GMCStream researches, analyzes, and highlights MILCOMM problems and solutions that may affect Global National Security. GMCStream was founded by Richard Kusiolek, an expert in Satellite Communications, cyber security, defense, and aerospace with private sector experience and expertise in international business development and strategy, particularly in China, Japan, and Eastern Europe.
The company is growing organically into a specialized niche media and technology company providing streaming video coverage on a variety of topics including politics, space and missile systems, cyber-warfare, defense networks. STEM career webinars, and planet exploration.